1. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG) 1: Information Technology Controls
2nd Edition
2012.
Page 13
Section 3.3 Identity and Access Management: Lists "Biometric devices (e.g.
fingerprint
voice
retina
and facial scans)" as a primary authentication mechanism for logical access.
Page 20
Section 3.6 Physical and Environmental Controls: Lists "Biometric access controls" as a key control to "restrict physical access to facilities and devices to authorized personnel only." This demonstrates the dual application of biometrics for both logical and physical control.
2. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG) 4: Management of IT Auditing
2nd Edition
2018.
Page 20
Exhibit 6: Physical Security Controls: Mentions "Biometric devices" as a control to secure physical locations like data centers. The guide also discusses authentication for logical access
for which biometrics are a primary example of the "something you are" factor.
3. Jain
A. K.
Ross
A.
& Prabhakar
S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology
14(1)
4-20.
Section I
Introduction: The paper states
"A wide variety of applications require reliable personal recognition schemes to either confirm or determine the identity of an individual... These applications can be divided into... physical access control
such as... access to buildings... and logical access control
such as... access to remote applications..." The paper then details how various biometric systems fulfill these roles. (DOI: https://doi.org/10.1109/TCSVT.2003.818349)